{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:40:12Z","timestamp":1767138012478,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319728162","type":"print"},{"value":"9783319728179","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_9","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"127-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Enforcing Memory Safety in Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Eyasu Getahun","family":"Chekole","sequence":"first","affiliation":[]},{"given":"John Henry","family":"Castellanos","sequence":"additional","affiliation":[]},{"given":"Mart\u00edn","family":"Ochoa","sequence":"additional","affiliation":[]},{"given":"David K. Y.","family":"Yau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Sha, L., Gopalakrishnan, S., Liu, X., Wang, Q.: Cyber-physical systems: a new frontier. In: SUTC 2008 (2008)","DOI":"10.1109\/SUTC.2008.85"},{"key":"9_CR2","unstructured":"Lee, E.A., Seshia, S.A.: Introduction to Embedded Systems - A Cyber-Physical Systems Approach, 2nd edn. Version 2.0 edn. (2015)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. In: ISORC 2008 (2008)","DOI":"10.1109\/ISORC.2008.25"},{"issue":"2","key":"9_CR4","first-page":"76","volume":"6","author":"Z Basnight","year":"2013","unstructured":"Basnight, Z., Butts, J., Lopez, J., Dube, T.: Firmware modification attacks on programmable logic controllers. IJCIP 6(2), 76\u201388 (2013)","journal-title":"IJCIP"},{"key":"9_CR5","unstructured":"Cui, A., Costello, M., Stolfo, S.J.: When firmware modifications attack: a case study of embedded exploitation. In: NDSS 2013 (2013)"},{"key":"9_CR6","unstructured":"MITRE: Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/"},{"key":"9_CR7","unstructured":"CVE-5814. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-5814"},{"key":"9_CR8","unstructured":"CVE-6438. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-6438"},{"key":"9_CR9","unstructured":"CVE-6436. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-6436"},{"key":"9_CR10","unstructured":"CVE-0674. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0674"},{"key":"9_CR11","unstructured":"CVE-1449. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-1449"},{"key":"9_CR12","unstructured":"CVE-0929. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0929"},{"key":"9_CR13","unstructured":"CVE-7937. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7937"},{"key":"9_CR14","unstructured":"CVE-5007. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-5007"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Berger, E.D., Zorn, B.G.: Diehard: probabilistic memory safety for unsafe languages. In: PLDI 2006 (2006)","DOI":"10.1145\/1133981.1134000"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Novark, G., Berger, E.D.: Dieharder: securing the heap. In: CCS 2010 (2010)","DOI":"10.1145\/1866307.1866371"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: CCS 2005, pp. 340\u2013353 (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"9_CR18","unstructured":"Zhang, M., Sekar, R.: Control flow integrity for cots binaries. In: USENIX 2013 (2013)"},{"key":"9_CR19","unstructured":"Tice, C., Roeder, T., Collingbourne, P., Checkoway, S., Erlingsson, \u00da., Lozano, L., Pike, G.: Enforcing forward-edge control-flow integrity in GCC & LLVM. In: USENIX 2014, pp. 941\u2013955 (2014)"},{"key":"9_CR20","unstructured":"Serebryany, K., Bruening, D., Potapenko, A., Vyukov, D.: Addresssanitizer: a fast address sanity checker. In: USENIX ATC 2012 (2012)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Nagarakatte, S., Zhao, J., Martin, M.M., Zdancewic, S.: SoftBound: highly compatible and complete spatial memory safety for C. In: PLDI 2009 (2009)","DOI":"10.1145\/1542476.1542504"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Nagarakate, S., Zhao, J., Martin, M.M., Zdancewic, S.: CETS: compiler enforced temporal safety for C. In: ISMM 2010 (2010)","DOI":"10.1145\/1806651.1806657"},{"issue":"1","key":"9_CR23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1002\/spe.2105","volume":"43","author":"MS Simpson","year":"2013","unstructured":"Simpson, M.S., Barua, R.K.: MemSafe: ensuring the spatial and temporal memory safety of C at runtime. Softw. Pract. Experience 43(1), 93\u2013128 (2013)","journal-title":"Softw. Pract. Experience"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Bruening, D., Zhao, Q.: Practical memory checking with Dr. Memory. In: CGO 2011 (2011)","DOI":"10.1109\/CGO.2011.5764689"},{"issue":"3","key":"9_CR25","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1145\/1065887.1065892","volume":"27","author":"GC Necula","year":"2005","unstructured":"Necula, G.C., Condit, J., Harren, M., McPeak, S., Weimer, W.: CCured: type-safe retrofitting of legacy software. ACM Trans. Program. Lang. Syst. 27(3), 477\u2013526 (2005)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"9_CR26","unstructured":"Eigler, F.Ch.: Mudflap: pointer use checking for C\/C++. Red Hat Inc. (2003)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Adepu, S., Mathur, A.: Limitations of state estimation based cyber attack detection schemes in industrial control systems. In: SCSP-W 2016 (2016)","DOI":"10.1109\/SCSPW.2016.7509557"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Bittau, A., Belay, A., Mashtizadeh, A., Mazi\u00e9res, D., Boneh, D.: Hacking blind. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy (2014)","DOI":"10.1109\/SP.2014.22"},{"issue":"2","key":"9_CR29","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MNET.2016.7437026","volume":"30","author":"H Zhang","year":"2016","unstructured":"Zhang, H., Shu, Y., Cheng, P., Chen, J.: Privacy and performance trade-off in cyber-physical systems. IEEE Netw. 30(2), 62\u201366 (2016)","journal-title":"IEEE Netw."},{"key":"9_CR30","unstructured":"OpenPLC. http:\/\/www.openplcproject.com\/"},{"key":"9_CR31","unstructured":"ScadaBR. http:\/\/www.scadabr.com.br\/"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Cooprider, N., Archer, W., Eide, E., Gay, D., Regehr, J.: Efficient memory safety for TinyOS. In: SenSys 2007, pp. 205\u2013218 (2007)","DOI":"10.1145\/1322263.1322283"},{"key":"9_CR33","unstructured":"The Deputy project (2007). http:\/\/deputy.cs.berkeley.edu"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Gay, D., Levis, P., von Behren, R., Welsh, M., Brewer, E., Culler, D.: The nesC language: a holistic approach to networked embedded systems. In: PLDI 2003 (2003)","DOI":"10.1145\/781131.781133"},{"issue":"3","key":"9_CR35","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1002\/etep.1862","volume":"25","author":"A Stefanov","year":"2015","unstructured":"Stefanov, A., Liu, C.C., Govindarasu, M., Wu, S.S.: Scada modeling for performance and vulnerability assessment of integrated cyber-physical systems. Int. Trans. Electr. Energy Syst. 25(3), 498\u2013519 (2015)","journal-title":"Int. Trans. Electr. Energy Syst."},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Hu, H., Shinde, S., Adrian, S., Chua, Z.L., Saxena, P., Liang, Z.: Data-oriented programming: on the expressiveness of non-control data attacks. In: SP 2016 (2016)","DOI":"10.1109\/SP.2016.62"}],"updated-by":[{"DOI":"10.1007\/978-3-319-72817-9_18","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000}}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T07:45:20Z","timestamp":1570520720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}